Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
f6426d1cdf5a6b0734559df613e949d0
-
SHA1
d476f55840268c4c8f1536efa2127a79c282b33b
-
SHA256
36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba
-
SHA512
1f6e4d425eb2c93cb861e7c8a8c9e06a7948e7a3f1f515ede7fd0079c9c6f228ba3098715a3427995aba81693ab1376a83b18d48c23e45dbc4c208dca193db97
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBZ9w4Sx:+R0pI/IQlUoMPdmpSpN4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2452 aoptiec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotNE\\aoptiec.exe" 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidI6\\optidevsys.exe" 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 2452 aoptiec.exe 2452 aoptiec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2452 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 94 PID 2236 wrote to memory of 2452 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 94 PID 2236 wrote to memory of 2452 2236 36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\36eb6e3fdfe6b20c43774ff968a2ab91babdc2bc49f90432e3b3150b334715ba_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\UserDotNE\aoptiec.exeC:\UserDotNE\aoptiec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD53eb66716c6971e9e1e64ade10a9f7c2a
SHA157592c166c2e5c6e0018fd7bd3f952792510bcca
SHA25683b638feab64536a633e3c2e4a6673e31b95be4c29d1a30484cc4b7cd648ff1a
SHA512bb57223bca8739b3fce8b00fc305625a99b04ca0fec4ed79d7e81395155a837290f6e30ffd9886e33639c8b3d84319a445b7d54bfccfea570a768c5f1fef5ae5
-
Filesize
206B
MD56cb2759d196b8eebd468a2928d2edc25
SHA171c4284402560828db7201d790191b8bb28a6a8d
SHA256ffcf9dc5a89a0c187f148dc5fdc9d54a6d8ed1822511717163d8d8f2eccbca98
SHA5123ec42597f0079043747c1e2b8d8d5c065c94fbefb7c72b28552fd64f50d24a4f18161fbaadd17852940e12c8f543b085fc24b2b579eede8fd0bd0ad82dd767b4
-
Filesize
9KB
MD5f24e8ebe2134fb9105f767ac6a5b13d6
SHA1d87bd5250acbcd27e4ac07ca739fedccef4a7ee1
SHA2566448e46123698d117ae1f2cc2ce1754ec43e0f78dc07011770f5412ae8e09e0e
SHA51222e754e2594bfee3cd7ff1f9288818db280a23d53652603c522cb85c04643b6c9c9725b59dc003037dc80a66b6ac004a61e127276dccc8d1c5122d850af2ff32
-
Filesize
2.7MB
MD5e25a95ccbb25e66efbc2761bac77b8e5
SHA17bcf410a98b1cfa5b293ae1ba1b084d33002826b
SHA256f5b8ff24028416d4323f493cf31cab9b43f643320e9d93caf97ee8a24a04d0c4
SHA512c407c9cea3bc4a514f379993c1cb23d6210576251df6d0c6beb4e643c788f837ac61d8adea22e951a3c9a8c9e6a3dce86d26afa74e4d1cde864087e346a5a949